[1] | 1 |
|
---|
| 2 | SAMHAIN distributed host monitoring system
|
---|
| 3 | ------------------------------------------
|
---|
| 4 |
|
---|
| 5 | Copyright (C) 1999-2004 Rainer Wichmann
|
---|
| 6 |
|
---|
| 7 | This program is free software; you can redistribute it and/or modify
|
---|
| 8 | it under the terms of the GNU General Public License as published by
|
---|
| 9 | the Free Software Foundation; either version 2 of the License, or
|
---|
| 10 | (at your option) any later version.
|
---|
| 11 |
|
---|
| 12 | This program is distributed in the hope that it will be useful,
|
---|
| 13 | but WITHOUT ANY WARRANTY; without even the implied warranty of
|
---|
| 14 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
---|
| 15 | GNU General Public License for more details.
|
---|
| 16 |
|
---|
| 17 | You should have received a copy of the GNU General Public License
|
---|
| 18 | along with this program; if not, write to the Free Software
|
---|
| 19 | Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
---|
| 20 |
|
---|
| 21 |
|
---|
| 22 | Incorporated code
|
---|
| 23 | -----------------
|
---|
| 24 |
|
---|
| 25 | (i) Support for the TIGER cryptographic checksum algorithm
|
---|
| 26 | is provided by the reference implementation, which includes
|
---|
| 27 | the following statement:
|
---|
| 28 |
|
---|
| 29 | * Tiger: A Fast New Hash Function
|
---|
| 30 | *
|
---|
| 31 | * Ross Anderson and Eli Biham
|
---|
| 32 | *
|
---|
| 33 | * Tiger has no usage restrictions nor patents. It can be used freely,
|
---|
| 34 | * with the reference implementation,
|
---|
| 35 | * with other implementations or with
|
---|
| 36 | * a modification to the reference implementation (as long as it still
|
---|
| 37 | * implements Tiger). We only ask you to let us know about your
|
---|
| 38 | * implementation and to cite the origin of Tiger and of the reference
|
---|
| 39 | * implementation.
|
---|
| 40 | *
|
---|
| 41 | * The authors' home pages can be found both in
|
---|
| 42 | * http://www.cs.technion.ac.il/~biham/ and in
|
---|
| 43 | * http://www.cl.cam.ac.uk/users/rja14/.
|
---|
| 44 | * The authors' email addresses are biham@cs.technion.ac.il
|
---|
| 45 | * and rja14@cl.cam.ac.uk.
|
---|
| 46 |
|
---|
| 47 |
|
---|
| 48 |
|
---|
| 49 | (ii) Support for testing write access by untrusted users
|
---|
| 50 | to any element in the path of a file is provided by the
|
---|
| 51 | public domain trustfile library, which includes the following
|
---|
| 52 | statement:
|
---|
| 53 |
|
---|
| 54 | * Author information:
|
---|
| 55 | * Matt Bishop
|
---|
| 56 | * Department of Computer Science
|
---|
| 57 | * University of California at Davis
|
---|
| 58 | * Davis, CA 95616-8562
|
---|
| 59 | * phone (916) 752-8060
|
---|
| 60 | * email bishop@cs.ucdavis.edu
|
---|
| 61 | *
|
---|
| 62 | * This code is placed in the public domain. I do ask that
|
---|
| 63 | * you keep my name associated with it, that you not represent
|
---|
| 64 | * it as written by you, and that you preserve these comments.
|
---|
| 65 | * This software is provided "as is" and without any guarantees
|
---|
| 66 | * of any sort.
|
---|
| 67 |
|
---|
| 68 | (iii) Support for big integer arithmetic is provided by the bignum
|
---|
| 69 | package (v. 1.2) by Henrik.Johansson@Nexus.Comm.SE,
|
---|
| 70 | which includes the following statement:
|
---|
| 71 |
|
---|
| 72 | * Everyone is allowed to distribute this package to anyone
|
---|
| 73 | * else, as long as all changes are recorded and mentioned.
|
---|
| 74 | * If you are including this in a commercial product, be sure
|
---|
| 75 | * to distribute _all_ of the package with the product.
|
---|
| 76 | *
|
---|
| 77 | * (...writing more stuff here later, but I guess everyone
|
---|
| 78 | * knows the approximate contents of it - no warranty, no
|
---|
| 79 | * charge, and so on. I guess it is like the GNU concept.
|
---|
| 80 | * Read that for further details...)
|
---|
| 81 |
|
---|
| 82 | (iv) Support for compression is provided by the (mini) LZO library,
|
---|
| 83 | which includes the following statement:
|
---|
| 84 |
|
---|
| 85 | * Copyright (C) 1999 Markus Franz Xaver Johannes Oberhumer
|
---|
| 86 | * Copyright (C) 1998 Markus Franz Xaver Johannes Oberhumer
|
---|
| 87 | * Copyright (C) 1997 Markus Franz Xaver Johannes Oberhumer
|
---|
| 88 | * Copyright (C) 1996 Markus Franz Xaver Johannes Oberhumer
|
---|
| 89 | *
|
---|
| 90 | * The LZO library is free software; you can redistribute it and/or
|
---|
| 91 | * modify it under the terms of the GNU General Public License as
|
---|
| 92 | * published by the Free Software Foundation; either version 2 of
|
---|
| 93 | * the License, or (at your option) any later version.
|
---|
| 94 | *
|
---|
| 95 | * The LZO library is distributed in the hope that it will be useful,
|
---|
| 96 | * but WITHOUT ANY WARRANTY; without even the implied warranty of
|
---|
| 97 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
---|
| 98 | * GNU General Public License for more details.
|
---|
| 99 | *
|
---|
| 100 | * You should have received a copy of the GNU General Public License
|
---|
| 101 | * along with the LZO library; see the file COPYING.
|
---|
| 102 | * If not, write to the Free Software Foundation, Inc.,
|
---|
| 103 | * 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
|
---|
| 104 | *
|
---|
| 105 | * Markus F.X.J. Oberhumer
|
---|
| 106 | * <markus.oberhumer@jk.uni-linz.ac.at>
|
---|
| 107 | * http://wildsau.idv.uni-linz.ac.at/mfx/lzo.html
|
---|
| 108 |
|
---|
| 109 | (v) Support for determining the type of a file system is provided by
|
---|
| 110 | code from the GNU find(1) utility which includes the following statement:
|
---|
| 111 |
|
---|
| 112 | /* fstype.c -- determine type of filesystems that files are on
|
---|
| 113 | Copyright (C) 1990, 91, 92, 93, 94 Free Software Foundation, Inc.
|
---|
| 114 |
|
---|
| 115 | This program is free software; you can redistribute it and/or modify
|
---|
| 116 | it under the terms of the GNU General Public License as published by
|
---|
| 117 | the Free Software Foundation; either version 2, or (at your option)
|
---|
| 118 | any later version.
|
---|
| 119 |
|
---|
| 120 | This program is distributed in the hope that it will be useful,
|
---|
| 121 | but WITHOUT ANY WARRANTY; without even the implied warranty of
|
---|
| 122 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
---|
| 123 | GNU General Public License for more details.
|
---|
| 124 |
|
---|
| 125 | You should have received a copy of the GNU General Public License
|
---|
| 126 | along with this program; if not, write to the Free Software
|
---|
| 127 | Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */
|
---|
| 128 |
|
---|
| 129 | /* Written by David MacKenzie <djm@gnu.ai.mit.edu>. */
|
---|
| 130 |
|
---|
| 131 |
|
---|
| 132 | (vi) Support for the MD5 hash algorithm is provided by code
|
---|
[30] | 133 | from busybox which is distributed under the GPL.
|
---|
[1] | 134 |
|
---|
[30] | 135 | /* md5.c - Functions to compute MD5 message digest of files or memory blocks
|
---|
| 136 | * according to the definition of MD5 in RFC 1321 from April 1992.
|
---|
| 137 | * Copyright (C) 1995, 1996 Free Software Foundation, Inc.
|
---|
| 138 | *
|
---|
| 139 | * NOTE: The canonical source of this file is maintained with the GNU C
|
---|
| 140 | * Library. Bugs can be reported to bug-glibc@prep.ai.mit.edu.
|
---|
| 141 | *
|
---|
| 142 | * This program is free software; you can redistribute it and/or modify it
|
---|
| 143 | * under the terms of the GNU General Public License as published by the
|
---|
| 144 | * Free Software Foundation; either version 2, or (at your option) any
|
---|
| 145 | * later version.
|
---|
| 146 | *
|
---|
| 147 | * This program is distributed in the hope that it will be useful,
|
---|
| 148 | * but WITHOUT ANY WARRANTY; without even the implied warranty of
|
---|
| 149 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
---|
| 150 | * GNU General Public License for more details.
|
---|
| 151 | *
|
---|
| 152 | * You should have received a copy of the GNU General Public License
|
---|
| 153 | * along with this program; if not, write to the Free Software Foundation,
|
---|
| 154 | * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
|
---|
| 155 | */
|
---|
[1] | 156 |
|
---|
[30] | 157 | /* Written by Ulrich Drepper <drepper@gnu.ai.mit.edu>, 1995. */
|
---|
| 158 |
|
---|
| 159 |
|
---|
[1] | 160 | (vi) Support for the SHA-1 hash algorithm is provided by code
|
---|
| 161 | from mhash which includes the following statement:
|
---|
| 162 |
|
---|
| 163 | /* sha.c - Implementation of the Secure Hash Algorithm
|
---|
| 164 | *
|
---|
| 165 | * Copyright (C) 1995, A.M. Kuchling
|
---|
| 166 | *
|
---|
| 167 | * Distribute and use freely; there are no restrictions on further
|
---|
| 168 | * dissemination and usage except those imposed by the laws of your
|
---|
| 169 | * country of residence.
|
---|
| 170 | *
|
---|
| 171 | * Adapted to pike and some cleanup by Niels Möller.
|
---|
| 172 | */
|
---|
| 173 |
|
---|
| 174 | /* $Id: sha1.c,v 1.2 2001/01/24 08:20:29 nmav Exp $ */
|
---|
| 175 |
|
---|
| 176 | /* SHA: NIST's Secure Hash Algorithm */
|
---|
| 177 |
|
---|
| 178 | /* Based on SHA code originally posted to sci.crypt by Peter Gutmann
|
---|
| 179 | in message <30ajo5$oe8@ccu2.auckland.ac.nz>.
|
---|
| 180 | Modified to test for endianness on creation of SHA objects by AMK.
|
---|
| 181 | Also, the original specification of SHA was found to have a weakness
|
---|
| 182 | by NSA/NIST. This code implements the fixed version of SHA.
|
---|
| 183 | */
|
---|
| 184 |
|
---|
| 185 | (vii) Support for AVL Trees is provided by code
|
---|
| 186 | from AVLTree which includes the following statement:
|
---|
| 187 |
|
---|
| 188 | /* zAVLTree.h: Header file for zAVLTrees.
|
---|
| 189 | * Copyright (C) 1998,2001 Michael H. Buselli
|
---|
| 190 | * This is version 0.1.3 (alpha).
|
---|
| 191 | * Generated from $Id: xAVLTree.h.sh,v 1.5 2001/06/07 06:58:28 cosine Exp $
|
---|
| 192 | *
|
---|
| 193 | * This library is free software; you can redistribute it and/or
|
---|
| 194 | * modify it under the terms of the GNU Library General Public
|
---|
| 195 | * License as published by the Free Software Foundation; either
|
---|
| 196 | * version 2 of the License, or (at your option) any later version.
|
---|
| 197 | *
|
---|
| 198 | * This library is distributed in the hope that it will be useful,
|
---|
| 199 | * but WITHOUT ANY WARRANTY; without even the implied warranty of
|
---|
| 200 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
---|
| 201 | * Library General Public License for more details.
|
---|
| 202 | *
|
---|
| 203 | * You should have received a copy of the GNU Library General Public
|
---|
| 204 | * License along with this library; if not, write to the Free
|
---|
| 205 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
---|
| 206 | *
|
---|
| 207 | * The author of this library can be reached at the following address:
|
---|
| 208 | * Michael H. Buselli
|
---|
| 209 | * 30051 N. Waukegan Rd. Apt. 103
|
---|
| 210 | * Lake Bluff, IL 60044-5412
|
---|
| 211 | *
|
---|
| 212 | * Or you can send email to <cosine@cosine.org>.
|
---|
| 213 | * The official web page for this product is:
|
---|
| 214 | * http://www.cosine.org/project/AVLTree/
|
---|
| 215 | */
|
---|
| 216 |
|
---|
| 217 | (viii) The modules sh_userfiles.c and sh_mounts.c have been
|
---|
| 218 | contributed by Eircom Net Computer Incident Response Team and
|
---|
| 219 | are authored by Jerry Connolly and Cian Synnott, respectively.
|
---|
| 220 |
|
---|
| 221 | They are released under the terms of the GNU General Public
|
---|
| 222 | License as published by the Free Software Foundation; either
|
---|
| 223 | version 2 of the License, or (at your option) any later version:
|
---|
| 224 |
|
---|
| 225 | "Feel free to GPL those files -
|
---|
| 226 | they were fully released by our company to the project.
|
---|
| 227 |
|
---|
| 228 | Cian
|
---|
| 229 |
|
---|
| 230 | --
|
---|
| 231 | Cian Synnott
|
---|
| 232 | Eircom Net Computer Incident Response Team"
|
---|
| 233 |
|
---|
| 234 | (ix) Enhanced functionality for the SUID check has been
|
---|
| 235 | contributed with a patch copyright by Rob Rati <rob.rati@motorola.com>.
|
---|
| 236 | The patch is licensed under the GPL with the following statement:
|
---|
| 237 |
|
---|
| 238 | "Here is the patch with the aforementioned feature enhancements, and I
|
---|
| 239 | license all changes within this patch under the GNU Public License (GPL)
|
---|
| 240 | GNU General Public License as published by the Free Software Foundation;
|
---|
| 241 | either version 2 of the License, or (at your option) any later version."
|
---|
| 242 |
|
---|
[18] | 243 | (x) Unit testing uses the 'cutest' framework by Asim Jalis, (files
|
---|
| 244 | CuTest.h, CuTest.c, make-tests.sh) which is licensed under the zlib license:
|
---|
[1] | 245 |
|
---|
[18] | 246 | * Copyright (c) 2003 Asim Jalis
|
---|
| 247 | *
|
---|
| 248 | * This software is provided 'as-is', without any express or implied
|
---|
| 249 | * warranty. In no event will the authors be held liable for any damages
|
---|
| 250 | * arising from the use of this software.
|
---|
| 251 | *
|
---|
| 252 | * Permission is granted to anyone to use this software for any purpose,
|
---|
| 253 | * including commercial applications, and to alter it and redistribute it
|
---|
| 254 | * freely, subject to the following restrictions:
|
---|
| 255 | *
|
---|
| 256 | * 1. The origin of this software must not be misrepresented; you must not
|
---|
| 257 | * claim that you wrote the original software. If you use this software in
|
---|
| 258 | * a product, an acknowledgment in the product documentation would be
|
---|
| 259 | * appreciated but is not required.
|
---|
| 260 | *
|
---|
| 261 | * 2. Altered source versions must be plainly marked as such, and must not
|
---|
| 262 | * be misrepresented as being the original software.
|
---|
| 263 | *
|
---|
| 264 | * 3. This notice may not be removed or altered from any source
|
---|
| 265 | * distribution.
|
---|
| 266 |
|
---|
| 267 |
|
---|
[1] | 268 | Other
|
---|
| 269 | -----
|
---|
| 270 |
|
---|
| 271 | Depending on the compilation options used, samhain may use the
|
---|
| 272 | SRP authentication algorithm (in an independent implementation,
|
---|
| 273 | without any use of code from the SRP software).
|
---|
| 274 | The original SRP software contains the following license statement:
|
---|
| 275 |
|
---|
| 276 | The SRP License
|
---|
| 277 | ---------------
|
---|
| 278 |
|
---|
| 279 | SRP and all related technologies are free for both commercial and
|
---|
| 280 | non-commercial use. They are distributed under a standard
|
---|
| 281 | X11-style Open Source license which is shown below.
|
---|
| 282 |
|
---|
| 283 | The SRP distribution contains parts from various freeware
|
---|
| 284 | packages; these parts fall under both the SRP Open Source license
|
---|
| 285 | and any existing licenses. Care has been taken to ensure that
|
---|
| 286 | these licenses are compatible with Open Source distribution,
|
---|
| 287 | but it is the responsibility of the licensee to comply with these
|
---|
| 288 | licenses. The file "Copyrights" contains a list of the copyrights
|
---|
| 289 | incorporated by portions of the software.
|
---|
| 290 |
|
---|
| 291 | This software is covered under the following copyright:
|
---|
| 292 |
|
---|
| 293 | /*
|
---|
| 294 | * Copyright (c) 1997-1999 The Stanford SRP Authentication Project
|
---|
| 295 | * All Rights Reserved.
|
---|
| 296 | *
|
---|
| 297 | * Permission is hereby granted, free of charge, to any person obtaining
|
---|
| 298 | * a copy of this software and associated documentation files (the
|
---|
| 299 | * "Software"), to deal in the Software without restriction, including
|
---|
| 300 | * without limitation the rights to use, copy, modify, merge, publish,
|
---|
| 301 | * distribute, sublicense, and/or sell copies of the Software, and to
|
---|
| 302 | * permit persons to whom the Software is furnished to do so, subject to
|
---|
| 303 | * the following conditions:
|
---|
| 304 | *
|
---|
| 305 | * The above copyright notice and this permission notice shall be
|
---|
| 306 | * included in all copies or substantial portions of the Software.
|
---|
| 307 | *
|
---|
| 308 | * THE SOFTWARE IS PROVIDED "AS-IS" AND WITHOUT WARRANTY OF ANY KIND,
|
---|
| 309 | * EXPRESS, IMPLIED OR OTHERWISE, INCLUDING WITHOUT LIMITATION, ANY
|
---|
| 310 | * WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
---|
| 311 | *
|
---|
| 312 | * IN NO EVENT SHALL STANFORD BE LIABLE FOR ANY SPECIAL, INCIDENTAL,
|
---|
| 313 | * INDIRECT OR CONSEQUENTIAL DAMAGES OF ANY KIND, OR ANY DAMAGES WHATSOEVER
|
---|
| 314 | * RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER OR NOT ADVISED OF
|
---|
| 315 | * THE POSSIBILITY OF DAMAGE, AND ON ANY THEORY OF LIABILITY, ARISING OUT
|
---|
| 316 | * OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
---|
| 317 | *
|
---|
| 318 | * In addition, the following conditions apply:
|
---|
| 319 | *
|
---|
| 320 | * 1. Any software that incorporates the SRP authentication technology
|
---|
| 321 | * must display the following acknowlegment:
|
---|
| 322 | * "This product uses the 'Secure Remote Password' cryptographic
|
---|
| 323 | * authentication system developed by Tom Wu (tjw@CS.Stanford.EDU)."
|
---|
| 324 | *
|
---|
| 325 | * 2. Any software that incorporates all or part of the SRP distribution
|
---|
| 326 | * itself must also display the following acknowledgment:
|
---|
| 327 | * "This product includes software developed by Tom Wu and Eugene
|
---|
| 328 | * Jhong for the SRP Distribution (http://srp.stanford.edu/srp/)."
|
---|
| 329 | *
|
---|
| 330 | * 3. Redistributions in source or binary form must retain an intact copy
|
---|
| 331 | * of this copyright notice and list of conditions.
|
---|
| 332 | */
|
---|